Design your deployment strategy

At the successful completion of this end-to-end test on a hardened infrastructure on a fully integrated system, you are now ready to design and then deploy your system into secure network architecture.

The key to the hardened network is the development of your network architecture (specifically, network security zones) and determining which software components goes into which zone.

Network zones are used to allow authorized network communication to support your business needs and at the same time restrict all other unauthorized network access.